Effect of Calibration Data on Forensic Likelihood Ratio from a Face Recognition System

Size: px
Start display at page:

Download "Effect of Calibration Data on Forensic Likelihood Ratio from a Face Recognition System"

Transcription

1 Effect of Calibration Data on Forensic Likelihood Ratio from a Face Recognition System Tauseef Ali, Luuk Spreeuwers, Raymond Veldhuis Biometric Pattern Recognition Group, FEEMCS, University of Twente PO Box 7, 75 AE Enschede, the Netherlands {T.Ali, L.J.Spreeuwers, R.N.J. Veldhuis}@utwente.nl Didier Meuwly Netherlands Forensic Institute PO Box, 9 AA The Hague, the Netherlands D.Meuwly@nfi.minvenj.nl Abstract A biometric system used for forensic evaluation requires a conversion of the score to a. A likelihood ratio can be computed as the ratio of the probability of a score given the prosecution hypothesis is true and the probability of a score given the defense hypothesis is true. In this paper we study two different approaches of a forensic computation in the context of forensic face recognition. These approaches differ in the databases they use to obtain the score distribution under the prosecution and the defense hypothesis and therefore consider slightly different interpretation of these hypotheses. The goal of this study is to quantify the effect of these approaches on the resultant in the context of evidence evaluation from a face recognition system. A state-of-the art commercial face recognition system is employed for facial images comparison and computation of scores. A simple forensic case is simulated by randomly selecting a small subset from the FRGC database. Images in this subset are used to estimate the score distribution under the prosecution and the defense hypothesis and the effect of different approaches of a computation is demonstrated and explained. It is observed that there is a significant variation in the resultant s given the databases which are used to model the prosecution and defense hypothesis are varied.. Introduction A score obtained from a face recognition system quantifies the similarity between the pair of input images while taking into account their typicality. In biometric applications such as access control to a building and e-passport gates at some airports, we choose a threshold from the range of the score and consequently any score above the threshold implies a positive decision and vice versa []. However, in a criminal case, there are facial images from a crime scene, e.g., facial recordings from a surveillance camera as well as images from the suspect. The responsibility of a forensic scientist is to give a Likelihood Ratio (LR) instead of a decision to the court []. Then, it is the responsibility of the judge or the jury to make a decision which involves other sources of information about the case at hand. Use of a LR to report the output of a biometric comparison is gradually becoming a standard way of evidence evaluation from score-based biometric systems. A LR is a more objective and useful output in forensic evaluation than simply a score []. A general description of the LR framework for evidence evaluation from biometric systems can be found in [, ]. It is applied to several biometric modalities including forensic voice [5], speaker [6, 7, 8] and fingerprint comparison [9]. Preliminary results of evidence evaluation using this framework in the context of face and handwriting recognition systems are presented in [,, ]. A LR is the probability of the score given the prosecution hypothesis is true divided by the probability of the score given the defense hypothesis is true: LR(s) = P (s H p) P (s H d ) where s, considered as the evidence, is the score obtained by comparison of the image from the suspect with the image found at the crime scene. H p and H d are two ()

2 mutually exclusive and exhaustive source-level hypotheses defined as follows: H p : The pair of input images that produced score s originated from the same source. H d : The pair of input images that produced score s originated from different sources. The LR computes a conditional probability of observing a particular value of the evidence s with respect to H p and H d. It is therefore an empirical tool to evaluate and compare these two hypotheses concerning the likely source of the trace image found at the crime scene. Once a forensic scientist has computed the LR, it can be interpreted as a multiplicative factor which updates the prior odds (before observing the evidence from a biometric system) to the posterior odds (after observing the evidence from a biometric system) using the Bayesian framework: P (H p s) P (H d s) = P (s H p) P (s H d ) P (H p) () P (H d ) In this framework, the judge or the jury is responsible for quantification of the prior beliefs about H p and H d while the forensic scientist is responsible for the quantitative evaluation of the evidence s in the form of a LR. The hypotheses H p and H d can be specifically interpreted in a slightly different way so that the same-source and different-source condition is linked with the specific suspect in a forensic case. These different interpretations correspond to differences in the pairs of images used to obtain the score distribution under H p and H d. In forensic evaluation, these pairs of images are called calibration data. The purpose of this paper is to quantify the evidential value from facial images using the framework and to quantify the effect of different calibration data used to obtain the score distribution under the prosecution and defense hypothesis []. The study is carried out in the specific context of face recognition, however, the concepts and proecedure described apply to any biometric system which computes a score for an input pair of samples. The paper is organised as follows. In section we briefly review the LR computation process from biometric scores and discuss the employed score-to-lr conversion method. Section discusses the two different approaches and the differences in the interpretation of the hypotheses it implies. Section reviews some existing work which studies the effects of different calibration data on LRs in the context of forensic speaker and handwriting recognition and presents the comparison procedures. Section 5 explains experimental setup and the degradation process to obtain trace-like images. Section 6 presents results by mapping score-axis to Log LR (LLR) using the two different approaches of LR computation. Finally section 7 draws conclusions and points toward future research directions.. Computation of a LR.. Computation of calibration scores -based biometric systems output two classes of scores. The first one is the result of the comparison of two samples produced by the same source. When comparing a set of samples produced by the same source, there is some variation in the score values output by a biometric system. Each modality has different nature of variations in the samples produced by the same source, for example, in case of face recognition systems it is caused by lighting condition, facial expressions and partial occlusion of the face, etc. A set of scores obtained by comparing samples from the same source represent the within-source variability of the score and is referred to as the within-source scores. Similarly, comparing a set of samples produced by different sources results in a set of scores that represent the between-source variability of the score and is referred to as the betweensource scores (see Fig. ). s in the within-source and in the between-source sets are collectively called calibration scores where the pair of samples to obtain these calibration scores are referred to as calibration data. W pairs of samples from same source B pairs of samples from different sources Face Recognition System Face Recognition System Within-source scores {s,s,..,sw} Between-source scores {s,s,..,sb} The pair of samples consisting of the suspect and the trace Likelihood ratio computation s Face Recognition System Figure : Computation of a score-based LR LR (s) In order to compare a pair of input images and obtain a score, we use a state-of-the-art commercial face recognition system []. This system computes a score value in the range of and... Mapping score-axis to s using calibration scores -based LR computation can be considered as a mapping function from score to LR. Given a set of calibration scores, there are several methods to map the score-axis to Likelihood Ratios (LRs). These methods as described in [5] can be classified as parametric or non-parametric. When the distribution of the within-source and the betweensource scores sets are similar to a standard probability density function (pdf), the pdf of score under H p and H d can be estimated by fitting standard pdfs with certain parameters using maximum likelihood estimation to these sets of

3 scores [9]. Another possible parametric approach is to estimate the ratio of the pdf under H p and pdf under H d using logistic regression [5]. In nonparametric category, there are histogram binning, Kernel Density Estimation (KDE) and finding slope of Receiver Operating Characteristic Convex Hull (ROCCH) [6]. For the scores obtained from the face recognition system in this study, we propose the use of ROCCH procedure due to the variability in the distribution of scores obtained and the mismatch of the distribution of scores to any standard family of pdf. This approach is preferred because it can ensure that the resultant variation in LRs are due to the differences in the within-source and between-source sets and not due to the poor fitting of the densities to the calibration score sets. Once ROCCH is computed for a given set of calibration scores, LR for a given score is the slope of the corresponding segment of the ROCCH and can be computed as follows: LR(s) = W B P (H d) () P (H p ) where W and B are the number of the within-source and the between-source scores respectively in the corresponding segment of the ROCCH on which score s lies. The value P (H d) P (H p) is computed from the size of the within-source and the between-source sets. It is interesting to note that computing ROCCH is equivalent to computing ROC of the posterior probabilities obtained by Pool Adjacent Violators (PAV) algorithm [6]. This argument leads to an alternative way of implementation; computing posterior probabilities using PAV and then plugging it into Bayesian formula along to compute LRs. Once the ROCCH procedure is applied to compute LRs, there are a group of scores for which the posterior probabilities are either or. The log odds of these posterior probabities results in minus infinities and plus infinities respectively. To avoid this problem, a procedure similar to [7] is followed. We replace a score in the between-source set by the maximum score in the within-source set and a score in the within-source set by the minimum score of the between-source set. These replaced scores can be considered to represent scores which were not encountered in the calibration scores because there is not enough calibration data, but which could have occurred. with P (H d) P (H p). Suspect-anchored and suspect-independent calibration data Based on the quantity of the available data from the suspect, the within-source and the between-source scores can be either anchored to the suspect or it can be general withinsource and between-source matches using all suspects from the potential population database. Suspect-anchored approach To compute the within-source scores, a set of images from the suspect can be compared with another set of images from the suspect. This is referred to as suspectanchored approach [8]. The two sets of images are referred to as suspect-reference and suspect-control data sets. For better calibration, the images in the suspect-control data set should be as close as possible to the trace and the images in the suspect-reference data set should be as close as possible to the potential population database. Cross comparison of all images in the suspect-reference and suspect-control data set results in a set of scores that can be used to model the distribution of scores under the prosecution hypothesis. Similarly, for modelling the distribution of scores under the defense hypothesis, images in the suspect-control data set are compared with images in the suspect-reference data set of all the suspects in the potential population [8]. The suspect-anchored approach implies considering the following interpretations of the prosecution and defense hypotheses: H p : The score s arises from the distribution of scores obtained by pairing suspect images in the suspectcontrol data set with the suspect images in the suspectreference data set. H d : The score s arises from the distribution of scores obtained by pairing suspect images in the suspectcontrol data set with the reference images in the potential population database. The difficulty in following the suspect-anchored approach is that in most cases it might not be possible to obtain a large set of data from the suspect in similar conditions to the trace. The lack of enough calibration data increases the uncertainty in the resultant estimate of a LR. Suspect-independent approach Certain specific solutions have appeared as how to increase the number of the within-source and the betweensource scores to estimate the distribution of scores under the prosecution and defense hypothesis [9, ]. A general solution to this problem is to compute the within-source scores by considering pairs of images from multiple potential suspects in the potential population database. Excluding images of the original suspect, images in the suspectcontrol and suspect-reference database of all the other suspects are paired with each other where each pair originate from the same source. This is referred to as suspectindependent approach. Similarly to obtain the suspectindependent between-source scores, reference images in the potential population are paired with the suspect-control data set of each suspect where each pair originate from different sources [8, ]. Using suspect-independent approach to

4 LR computation implies the following interpretations of the prosecution and defense hypotheses: H p : s arises from the distribution of scores obtained by pairing images in the suspect-control and suspect-reference data set of all the suspects in potential population where the paired images are obtained from the same source. H d : s arises from the distribution of scores obtained by pairing images in the suspect-control and suspect-reference data set of all the suspects in potential population where the paired images are obtained from different sources. For the between-source scores, besides the suspectanchored and suspect-independent approaches, another commonly used approach is to compute trace-anchored scores. In this approach, trace image is compared with all the reference images of the potential population to compute the between-source scores [].. Comparing the resultant LRs Since it is preferable to compute a suspect-anchored LR, there is some research on how to compute a LR for a biometric comparison when there is a limited calibration data available from the suspect. Ramos [] proposed a strategy which is based on the adaptation of the suspectindependent within-source score distribution to the suspectanchored scores via Maximum A Posteriori (MAP) estimation. Similarly, in forensic handwriting recognition, Davis [9] generated simulated writing samples from a small set of suspect samples to form a database for computation of the suspect-anchored within-source scores. These specific approaches do not generalize in most cases and usually a suspect-independent approach is considered as a last resort to compute a reliable LR for the evidence s []. In [] suspect-independent approach is proposed as a feasible alternative when a single sample is available from the suspect. Given the common use of the suspect-independent approach as an alternative to the suspect-anchored approach, it is important to study and analyse the differences in the score-to-lr functions produced by these approaches. Quantifying the variability between the suspectanchored and suspect-independent approach is still under investigation in most of biometric modalities including face recognition. Ramos [] studied the effect of using suspect-independent within-source scores instead of suspect-anchored approach on the resultant LRs in the context of speaker recognition. [9] describes the effect(s) of different calibrations data used to construct the denominator distribution in the context of handwriting recognition. We compute two functions from score to LLR using the suspect-anchored and suspect-independent sets of calibration scores. The behavior of these two score-to-llr functions is studied in different regions of the score-axis which correponds to different evidence values. For a more quantitative evaluation, we generate evidence values by uniformly sampling the score-axis and compute the number of cases in which these two approaches agree and disagree on a given range of LRs. A disagreement is reported when one approach produces a LR that falls into a different range. These ranges correspond to verbal equivalents which can be used in certain situations to report the forensic evaluation of the evidence. These ranges along with their corresponding verbal equivalnets are shown in table []. 5. Experimental setup To simulate a forensic case, we randomly select a small subset of five subjects from the FRGC [] database. Each subject has 6 frontal images taken in different illumination condition. For each subject, half of the images are used to create the suspect-control database while the remaining half are used as a suspect-reference database. Images in the suspect-control database are degraded by adding motion blur of 5 pixels with zero angle and downsampling them by half of the original resolution. Face regions are manually cropped where eye detection is performed automatically by the face recognition system []. Figure shows an example of the degradation applied to an image for creation of the suspect-control data set. The goal of the degradation process is to make the images in the suspect-control data set similar to a trace image. Insert motion blur Downsample Figure : An example of the degradation process applied to obtain suspect-control data set. Figure illustrates computation of the within-source and the between-source sets in each approach for a single image per subject assuming subject is the suspect. Table shows the number of unique comparisons (and hence the number of scores) in each appraoch of the withinsource and the between-source scores sets computation given 5 subjects and 8 images per subject in the probe and gallery set.

5 subject subject subject 5 subject subject subject 5 subject subject subject 5 S(,) Suspect-anchored within-source score S(,).. Suspect-independent within-source scores S(5,5) subject subject subject 5 S(,).. S(,5) S(,) S(,) S(,5) (a) S(5,) S(5,) S(,) Suspect-anchored between-source scores Suspect-independent between-source scores (b) Figure : The within-source and the between-source scores sets assuming the first subject as the suspect and image per subject. a) Computation of the within-source scores sets b) Computation of the between-source scores sets. within-source scores Suspect-anchored 8 X 8 = Suspect-independent X = 96 between-source scores Suspect-anchored 8 X (8 X ) = 96 Suspect-independent X 96 = 58 Table : Number of scores in the set of the within-source and the between-source scores. 6. Experimental results The score-axis is mapped to LLR using suspectanchored and suspect-independent approach in order to compare their score-to-llr mapping functions. Figure shows the frequency histograms of the scores in the within-source and the between-source sets, the ROCs of the calibration scores in the suspect-anchored and suspectindependent approach and the score-to-llr functions obtained by the ROCCH procedure as described in section.. Note the greater variation in the within-source scores for the suspect-anchored approach. Images of each subject are selected in such a way so that the variation in illumination and facial expressions are as close as possible across different subjects. Other conditions such as resolution and face pose is the same across all the subjects. However, still we observe considerable variation in the shape of the suspectanchored frequency histograms of the within-source scores. Variation in the histograms of the suspect-anchored withinsource scores are caused by either the slight difference in the illumination conditions and facial expressions or due to the difference in identity. Illumination conditions and facial expressions are very similar across different subjects, however, they are not the same for all 6 images of each subject. Besides the slight difference in illumination condition and facial expression, identity itself has effect on the suspect-anchored within-source scores distribution. A face recognition algorithm may perform differently for different subjects when it is used to match images of the same subject. Generally, it is expected that the suspect-anchored approach produces scores and subsequent LRs which are more discriminative as in the case of the first three subjects. However, this is not true in case of subject and 5 where the suspect-anchored within-source scores have more standard deviation than the suspect-independent within-source scores. There is a significant variation in the values of the LRs computed using the suspect-anchored and suspectindependent approach. For example in the case of subject, at the score location of., the suspect-anchored and the suspect-independent LR is 5 and 78 respectively. The horizontal lines in the mapping functions are due to the proposed strategy to avoid infinite LLRs. Values of LRs along this horizontal line are referred to as saturated LRs. These LRs, as illustrated later, depend on the size of the calibration scores used to map score-axis to LRs. In this region of LRs, the suspect-independent approach results in higher values of LRs than the suspect-anchored approach. Given the fact that LRs in the higher ranges are more important and useful in practice than in the lower and in the middle ranges, it can be argued that, in practice, the anchoring plays a crucial role. Note that the suspect-independent mapping functions across different subjects can be considered to reflect the possible variation in s when a different suspect is considered keeping the calibration data constant. In most cases the exact numerical value of a likelihood ratio is of less importance than the range in which it lies. These ranges can be taken into consideration when performing such a comparative study. The score-axis is uniformly sampled to simulate values of evidence s. These scores are converted to LLRs using each of the LR computation approach. Table shows the number of cases in which the two approaches compute LLRs which fall into the same range. As seen from table, in 96 cases out of 5, the two LRs agree on same verbal equivalents resulting in 59.% agreement rate. A considerable difference results from the fact that for subject and subject 5, the saturated LRs are in different ranges. Note that using a different face recognition system to compute scores and using a different method to map scoreaxis to LRs might lead to completely different results. Similarly a different database of images might also influence the variations between the suspect-anchored and suspect-

6 Within source Betweem source Suspect anchored Suspect independent Log Log Log Log Log Figure : The first two columns show the frequency histograms of the suspect-anchored () and suspect-independent () within-source and between-source scores sets. The third columns plots the ROCs from the corresponding sets of the withinsource and between-source scores. Last column shows the mapping function from score to LLR using the ROCCH procedure. Row through 5 repeat the same experiment considering each of the 5 subjects in the selected subset as the suspect.

7 Ranges Verbal equivalents Number of agreements P P P P P5 Total < LLR Very strong evidence to support H p < LLR Strong evidence to support H p < LLR Moderately strong evidence to support H p < LLR Moderate evidence to support H p < LLR Limited evidence to support H p < LLR Limited evidence to support H d 6 5 -< LLR - Moderate evidence to support H d 5 7 -< LLR - Moderately strong evidence to support H d 8 -< LLR - Strong evidence to support H d LLR < - Very strong evidence to support H d 5 Total Table : Number of times in which the LRs computed by the two approaches falls into same ranges. For each subject considered as the suspect, there are values of s generated by uniformly sampling the score-axis. Out of a total of 5 LRs computed by the two approaches, 96 times the LRs agree on one range of LLRs. Suspect anchored Suspect independent Log Log Log Log Log Figure 5: -axis is mapped to LLRs using the same sizes of the within-source and the between-source sets in the suspectanchored and suspect-independent approach. independent approach of LR computation. The effect of the difference in the size of the calibration sets between the suspect-anchored and suspect-independent approach can be investigated by randonly sampling without replacement a number of scores equal to the size of the suspect-anchored sets from the suspect-independent sets. Given the size of the within-source and between-source sets in the suspect-anchored and suspect-independent approach is the same, the variation in LRs is only caused by the nature of the distributions of the scores. Figure 5 shows the mapping function obtained by the two approaches when the within-source and the between-source sets are equally sized by random subsampling the suspect-independent withinsource and between-source sets so that the sizes of these sets in the suspect-independent approach is equal to those in the suspect-anchored approach. Note that reduction in the size of the calibration scores reduces the range of LRs that can be computed. This can be seen by comparing the mapping functions of the suspect-independent approach in figure and figure 5. Besides the saturated region of LRs, the difference in the size of the calibration sets has less effect on the resultant mapping function from score to LLRs. 7. Conclusions and future work We discussed the effect of different calibration data on the resultant forensic LR in the context of face recognition. The process of conversion of a score, obtained from the comparison of the crime scene image with the suspect image, to a forensic LR is described. It is observed that there is a significant variation between the LRs obtained using suspect-anchored and suspect-independent approach. The differences are more prominent in the higher ranges of LRs and therefore more caution should be taken if one approach is used as an altenative to the other. Future work will include quantifying the influence of images from other databases, different face recognition systems and other score-to-lr conversion methods. Furthermore, it is also of interest to study and compare these results from other modalities such as speech.

8 8. Acknowledgement The research is funded by the European commission as Marie-Curie ITN-project (FP7-PEOPLE-ITN-8) Bayesian Biometrics for Forensics. We would like to thank Cognitec Systems GmbH. for supporting our research by providing the FaceVACS software. Results obtained for FaceVACS were produced in experiments conducted by the University of Twente, and should therefore not be construed as a vendor s maximum effort full capability result. References [] A. K. Jain, P. Flynn and A. Ross. Handbook of Biometrics. Springer-Verlag: 7 [] Lucy D. Introduction to statistics for forensic scientists. West Sussex. John Wiley Sons, Inc: 5. [] C.G.G. Aitken, F. Taroni. Statistics and the evaluation of forensic evidence for forensic scientist. nd ed, Wiley, Chichester, UK:. [] B. Robertson, G.A. Vignaux. Interpreting evidence. Wiley, Chichester, UK: 995. [5] G.S. Morrison. Forensic voice comparison. in: I. Freckelton, H. Selby (Eds.), Expert Evidence, Thomson Reuters, Sydney, Australia: ch 99,. [6] C. Champod, D. Meuwly. The inference of identity in forensic speaker recognition. Speech Communication: 9-,, doi:.6/s67-69(99)78-. [7] P. Rose. Technical forensic speaker recognition. Computer Speech and Language : 59-9, 6 doi:.6/j.csl [8] Ramos Castro D. Forensic evaluation of the evidence using automatic speaker recognition systems [PhD dissertation]. Madrid (Spain): Universidad Autonoma de Madrid, 7. [9] C. Neumann, I.W. Evett, J. Skerrett. Quantifying the weight of evidence from a forensic fingerprint comparison: a new paradigm. Journal of the Royal Statistical Society: Series A 75 (), -6,. [] C. Peacock, A. Goode and A. Brett. Automatic forensic face recognition from digital images. Sci. Justice (): 9-,. [] T. Ali, L.J. Spreeuwers, and R.N.J. Veldhuis. Towards automatic forensic face recognition. In: International Conference on Informatics Engineering and Information Science (ICIEIS), Kuala Lumpur, Malaysia, Communications in Computer and Information Science 5: 7-55, Springer Verlag, ISSN ,. [] A.B. Hepler, C.P. Saunders, L.J. Davis, J. Buscaglia. -based s for handwriting evidence. Forensic Science International, 9: 9. doi:.6/j.forsciint...9,. [] Cognitec FaceVACS SDK version 8..:. [] G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, Sheep, Goats, Lambs and Wolves: A Statistical Analysis of Speaker Performance in the NIST 998 Speaker Recognition Evaluation, Proc. Intl Conf. Spoken Language Processing, 998. [5] T. Ali. and L.J. Spreeuwers and R.N.J. Veldhuis. A review of calibration methods for biometric systems in forensic applications. In: rd WIC Symposium on Information Theory in the Benelux, Boekelo, Netherlands: 6-,ISBN ,. [6] T. Fawcett and A. Niculescu-Mizil. PAV and the ROC convex hull. Machine Learning, 68(): 97-6, 7. [7] N. Brummer, J. Preez. Application-independent evaluation of speaker detection. Comput. Speech Lang. : 75, 6. [8] A. Nordgaard, T. Hoglund. Assessment of approximate likelihood ratios from continuous distributions: a case study of digital camera identification, Journal of Forensic Sciences 56: 9,. [9] L.J. Davis, C.P. Saunders, A.B. Hepler, J. Buscaglia. Using subsampling to estimate the strength of handwriting evidence via score-based s, Forensic Science International, 9: 9-,. [] D. Ramos,, J. Gonzalez-Rodriguez, G. Zadora, J. Zieba- Palus, C. Aitken. Information-theoretical comparison of likelihood-ratio methods of forensic evidence evaluation. In: Int. Symposium on Information Assurance and Security/ IWCF, Manchester, UK, IEEE-CS Press: 7 [] D. Meuwly, Forensic Individualization from Biometric Data. Science and Justice, 6(): 5-, 6. [] D. Ramos-Castro, J. Gonzlez-Rodrguez, A. Montero- Asenjo, J. Ortega-Garca. Suspect-adapted map estimation of within-source distributions in generative likelihood ratio estimation. Proceedings of the IEEE Odyssey Speaker and Language Recognition Workshop, doi:.9/odyssey.6.89.science International 6: 657,. [] F. Botti, A. Alexander, A. Drygajlo. An interpretation framework for the evaluation of evidence in forensic automatic speaker recognition with limited suspect data. In: Proceedings of Odyssey, the Speaker and Language Recognition Workshop, Toledo, Spain: 668,. [] P. J. Phillips, P.J. Flynn, T. Scruggs, K. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, W. Worek. Overview of the Face Recognition Grand Challenge. CVPR: 5.

Between-Source Modelling for Likelihood Ratio Computation in Forensic Biometric Recognition

Between-Source Modelling for Likelihood Ratio Computation in Forensic Biometric Recognition Between-Source Modelling for Likelihood Ratio Computation in Forensic Biometric Recognition Daniel Ramos-Castro 1, Joaquin Gonzalez-Rodriguez 1, Christophe Champod 2, Julian Fierrez-Aguilar 1, and Javier

More information

Introduction to Logical Reasoning for the Evaluation of Forensic Evidence. Geoffrey Stewart Morrison. p p(e H )

Introduction to Logical Reasoning for the Evaluation of Forensic Evidence. Geoffrey Stewart Morrison. p p(e H ) Introduction to Logical Reasoning for the Evaluation of Forensic Evidence Geoffrey Stewart Morrison p(e H ) p p(e H ) d http://forensic-evaluation.net/ Abstract In response to the 2009 US National Research

More information

Automatic Face Recognition and Identification Tools in the Forensic Science Domain

Automatic Face Recognition and Identification Tools in the Forensic Science Domain Automatic Face Recognition and Identification Tools in the Forensic Science Domain Angelo Salici ( ) and Claudio Ciampini Raggruppamento Carabinieri Investigazioni Scientifiche, RIS di Messina, S.S.114

More information

A New Paradigm for Forensic Science. Geoffrey Stewart Morrison Ewald Enzinger. p p(e H )

A New Paradigm for Forensic Science. Geoffrey Stewart Morrison Ewald Enzinger. p p(e H ) A New Paradigm for Forensic Science Geoffrey Stewart Morrison Ewald Enzinger p(e H ) p p(e H ) d Abstract In Europe there has been a great deal of concern about the logically correct way to evaluate the

More information

Shunichi Ishihara Department of Linguistics Australian National University

Shunichi Ishihara Department of Linguistics Australian National University A Comparative Study of Two Procedures for Calculating Likelihood Ratio in Forensic Text Comparison: Multivariate Kernel Density vs. Gaussian Mixture Model-Universal Background Model Shunichi Ishihara Department

More information

Challenges of Fingerprint Biometrics for Forensics

Challenges of Fingerprint Biometrics for Forensics Challenges of Fingerprint Biometrics for Forensics Dr. Julian Fierrez (with contributions from Dr. Daniel Ramos) Universidad Autónoma de Madrid http://atvs.ii.uam.es/fierrez Index 1. Introduction: the

More information

Response to: DR AS Forensic analysis - Part 3 - Interpretation

Response to: DR AS Forensic analysis - Part 3 - Interpretation 2012-08-16 Response to: DR AS 5388.3 Forensic analysis - Part 3 - Interpretation Response prepared by: Dr Geoffrey Stewart Morrison Director Forensic Voice Comparison Laboratory School of Electrical Engineering

More information

Geoffrey Stewart Morrison 1,2. School of Electrical Engineering & Telecommunications, University of New South Wales, UNSW Sydney, NSW 2052, Australia

Geoffrey Stewart Morrison 1,2. School of Electrical Engineering & Telecommunications, University of New South Wales, UNSW Sydney, NSW 2052, Australia Research Report CALCULATION OF FORENSIC LIKELIHOOD RATIOS: USE OF MONTE CARLO SIMULATIONS TO COMPARE THE OUTPUT OF SCORE- BASED APPROACHES WITH TRUE LIKELIHOOD-RATIO VALUES Geoffrey Stewart Morrison,2

More information

A New Paradigm for the Evaluation of Forensic Evidence

A New Paradigm for the Evaluation of Forensic Evidence A New Paradigm for the Evaluation of Forensic Evidence and its implementation in forensic voice comparison Geoffrey Stewart Morrison Ewald Enzinger p(e H ) p p(e H ) d Abstract & Biographies In Europe

More information

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

PDF hosted at the Radboud Repository of the Radboud University Nijmegen PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is an author's version which may differ from the publisher's version. For additional information about this

More information

Statistical Analysis in Forensic Science

Statistical Analysis in Forensic Science Statistical Analysis in Forensic Science Statistical Analysis in Forensic Science Evidential Value of Multivariate Physicochemical Data Grzegorz Zadora Institute of Forensic Research, Kraków, Poland Agnieszka

More information

A New Paradigm for the Evaluation of Forensic Evidence. Geoffrey Stewart Morrison. p p(e H )

A New Paradigm for the Evaluation of Forensic Evidence. Geoffrey Stewart Morrison. p p(e H ) A New Paradigm for the Evaluation of Forensic Evidence Geoffrey Stewart Morrison p(e H ) p p(e H ) d Abstract In Europe there has been a great deal of concern about the logically correct way to evaluate

More information

https://www.whitehouse.gov/webform/pcast-forensic-science-solicitation-questions-0

https://www.whitehouse.gov/webform/pcast-forensic-science-solicitation-questions-0 2015-12-04a President's Council of Advisors on Science and Technology https://www.whitehouse.gov/administration/eop/ostp/pcast https://www.whitehouse.gov/webform/pcast-forensic-science-solicitation-questions-0

More information

Geoffrey Stewart Morrison

Geoffrey Stewart Morrison Basic Workshop on Forensic Statistics Introduction to logical reasoning for the evaluation of forensic evidence Geoffrey Stewart Morrison p(e H ) p p(e H ) d These slides are available on the following

More information

Shunichi Ishihara Department of Linguistics, The Australian National University

Shunichi Ishihara Department of Linguistics, The Australian National University An Effect of Background Population Sample Size on the Performance of a Likelihood Ratio-based Forensic Text Comparison System: A Monte Carlo Simulation with Gaussian Mixture Model Shunichi Ishihara Department

More information

A Forensic Authorship Classification in SMS Messages: A Likelihood Ratio Based Approach Using N-gram

A Forensic Authorship Classification in SMS Messages: A Likelihood Ratio Based Approach Using N-gram A Forensic Authorship Classification in SMS Messages: A Likelihood Ratio Based Approach Using N-gram Shunichi Ishihara The Australian National University School of Culture, History and Language Department

More information

Improving statistical estimates used in the courtroom. Precis. Bayes Theorem. Professor Norman Fenton. Queen Mary University of London and Agena Ltd

Improving statistical estimates used in the courtroom. Precis. Bayes Theorem. Professor Norman Fenton. Queen Mary University of London and Agena Ltd Improving statistical estimates used in the courtroom Professor Norman Fenton Queen Mary University of London and Agena Ltd Address: Queen Mary University of London School of Electronic Engineering and

More information

Focus on Quality, Predicting FRVT 2006 Performance

Focus on Quality, Predicting FRVT 2006 Performance Focus on Quality, Predicting FRVT 2006 Performance J. Ross Beveridge Department of Computer Science Colorado State University ross@cs.colostate.edu P. Jonathon Phillips National Institute of Standards

More information

Skin color detection for face localization in humanmachine

Skin color detection for face localization in humanmachine Research Online ECU Publications Pre. 2011 2001 Skin color detection for face localization in humanmachine communications Douglas Chai Son Lam Phung Abdesselam Bouzerdoum 10.1109/ISSPA.2001.949848 This

More information

A comment on the PCAST report: Skip the match / non-match stage

A comment on the PCAST report: Skip the match / non-match stage This is a pre-publication version of: Morrison, G.S., Kaye, D.H., Balding, D.J., Taylor, D., Dawid, P., Aitken, C.G.G., Gittelson, S., Zadora, G., Robertson, B., Willis, S., Pope, S., Neil, M., Martire,

More information

Why the effect of prior odds should accompany. the likelihood ratio when reporting DNA evidence

Why the effect of prior odds should accompany. the likelihood ratio when reporting DNA evidence Why the effect of prior odds should accompany the likelihood ratio when reporting DNA evidence Ronald Meester 1 and Marjan Sjerps 2 June 11, 2003 1 Divisie Wiskunde, Faculteit der Exacte Wetenschappen,

More information

Demographics versus Biometric Automatic Interoperability

Demographics versus Biometric Automatic Interoperability Demographics versus Biometric Automatic Interoperability Maria De Marsico 1, Michele Nappi 2, Daniel Riccio 2, and Harry Wechsler 3 1 Department of Computer Science, Sapienza University of Rome, Italy

More information

THE PLACE OF FORENSIC VOICE COMPARISON IN THE ONGOING PARADIGM SHIFT. Geoffrey Stewart Morrison 1,2

THE PLACE OF FORENSIC VOICE COMPARISON IN THE ONGOING PARADIGM SHIFT. Geoffrey Stewart Morrison 1,2 THE PLACE OF FORENSIC VOICE COMPARISON IN THE ONGOING PARADIGM SHIFT Geoffrey Stewart Morrison 1,2 1 School of Language Studies, Australian National University, Canberra, ACT 0200, Australia 2 School of

More information

A response to: NIST experts urge caution in use of courtroom evidence presentation method

A response to: NIST experts urge caution in use of courtroom evidence presentation method A response to: NIST experts urge caution in use of courtroom evidence presentation method Geoffrey Stewart Morrison Reader in Forensic Speech Science, Centre for Forensic Linguistics, Aston University

More information

A Forensic Text Comparison in SMS Messages: A Likelihood Ratio Approach with Lexical Features

A Forensic Text Comparison in SMS Messages: A Likelihood Ratio Approach with Lexical Features A Forensic Text Comparison in SMS Messages: A Likelihood Ratio Approach with Lexical Features S. Ishihara The Australian National University, Department of Linguistics, Australia e-mail: shunichi.ishihara@anu.edu.au

More information

Modelling crime linkage with Bayesian Networks

Modelling crime linkage with Bayesian Networks 1 Modelling crime linkage with Bayesian Networks 2 Jacob de Zoete, Marjan Sjerps, David Lagnado, Norman Fenton de Zoete, J, Sjerps, M, Lagnado,D, Fenton, N.E. (2015), "Modelling Crime Linkage with Bayesian

More information

A Longitudinal Study of Iris Recognition in Children

A Longitudinal Study of Iris Recognition in Children A Longitudinal Study of Iris Recognition in Children Morgan Johnson johnsomi@clarkson.edu Laura Holsopple lholsopp@clarkson.edu David Yambay yambayda@clarkson.edu Stephanie Schuckers sschucke@clarkson.edu

More information

Classification and Statistical Analysis of Auditory FMRI Data Using Linear Discriminative Analysis and Quadratic Discriminative Analysis

Classification and Statistical Analysis of Auditory FMRI Data Using Linear Discriminative Analysis and Quadratic Discriminative Analysis International Journal of Innovative Research in Computer Science & Technology (IJIRCST) ISSN: 2347-5552, Volume-2, Issue-6, November-2014 Classification and Statistical Analysis of Auditory FMRI Data Using

More information

Facial expression recognition with spatiotemporal local descriptors

Facial expression recognition with spatiotemporal local descriptors Facial expression recognition with spatiotemporal local descriptors Guoying Zhao, Matti Pietikäinen Machine Vision Group, Infotech Oulu and Department of Electrical and Information Engineering, P. O. Box

More information

Local Image Structures and Optic Flow Estimation

Local Image Structures and Optic Flow Estimation Local Image Structures and Optic Flow Estimation Sinan KALKAN 1, Dirk Calow 2, Florentin Wörgötter 1, Markus Lappe 2 and Norbert Krüger 3 1 Computational Neuroscience, Uni. of Stirling, Scotland; {sinan,worgott}@cn.stir.ac.uk

More information

Bayesian Tolerance Intervals for Sparse Data Margin Assessment

Bayesian Tolerance Intervals for Sparse Data Margin Assessment Bayesian Tolerance Intervals for Sparse Data Margin Assessment Benjamin Schroeder and Lauren Hund ASME V&V Symposium May 3, 2017 - Las Vegas, NV SAND2017-4590 C - (UUR) Sandia National Laboratories is

More information

TWO HANDED SIGN LANGUAGE RECOGNITION SYSTEM USING IMAGE PROCESSING

TWO HANDED SIGN LANGUAGE RECOGNITION SYSTEM USING IMAGE PROCESSING 134 TWO HANDED SIGN LANGUAGE RECOGNITION SYSTEM USING IMAGE PROCESSING H.F.S.M.Fonseka 1, J.T.Jonathan 2, P.Sabeshan 3 and M.B.Dissanayaka 4 1 Department of Electrical And Electronic Engineering, Faculty

More information

Natural Revocability in Handwritten Signatures to Enhance Biometric Security

Natural Revocability in Handwritten Signatures to Enhance Biometric Security 212 International Conference on Frontiers in Handwriting Recognition Natural Revocability in Handwritten Signatures to Enhance Biometric Security Tasmina Islam and Michael Fairhurst School of Engineering

More information

3135th JUSTICE and HOME AFFAIRS Council meeting Brussels, 13 and 14 December 2011

3135th JUSTICE and HOME AFFAIRS Council meeting Brussels, 13 and 14 December 2011 COUNCIL OF THE EUROPEAN UNION Council conclusions on the vision for European Forensic Science 2020 including the creation of a European Forensic Science Area and the development of forensic science infrastructure

More information

TESTS OF ROBUSTNESS OF GMM SPEAKER VERIFICATION IN VoIP TELEPHONY

TESTS OF ROBUSTNESS OF GMM SPEAKER VERIFICATION IN VoIP TELEPHONY ARCHIVES OF ACOUSTICS 32, 4 (Supplement), 187 192 (2007) TESTS OF ROBUSTNESS OF GMM SPEAKER VERIFICATION IN VoIP TELEPHONY Piotr STARONIEWICZ Wrocław University of Technology Institute of Telecommunications,

More information

Quantifying the Association Between Discrete Event Time Series

Quantifying the Association Between Discrete Event Time Series Quantifying the Association Between Discrete Event Time Series Christopher Galbraith Padhraic Smyth & Hal S. Stern Department of Statistics Department of Computer Science July 31, 2018 ics.uci.edu/~galbraic/

More information

White Paper Estimating Complex Phenotype Prevalence Using Predictive Models

White Paper Estimating Complex Phenotype Prevalence Using Predictive Models White Paper 23-12 Estimating Complex Phenotype Prevalence Using Predictive Models Authors: Nicholas A. Furlotte Aaron Kleinman Robin Smith David Hinds Created: September 25 th, 2015 September 25th, 2015

More information

Identity Verification Using Iris Images: Performance of Human Examiners

Identity Verification Using Iris Images: Performance of Human Examiners Identity Verification Using Iris Images: Performance of Human Examiners Kevin McGinn, Samuel Tarin and Kevin W. Bowyer Department of Computer Science and Engineering University of Notre Dame kmcginn3,

More information

Mammogram Analysis: Tumor Classification

Mammogram Analysis: Tumor Classification Mammogram Analysis: Tumor Classification Term Project Report Geethapriya Raghavan geeragh@mail.utexas.edu EE 381K - Multidimensional Digital Signal Processing Spring 2005 Abstract Breast cancer is the

More information

LINKAGE PROJECT APPLICATION PROJECT ID: LP

LINKAGE PROJECT APPLICATION PROJECT ID: LP LINKAGE PROJECT APPLICATION PROJECT ID: LP100200142 A2 Proposal Title Making demonstrably reliable forensic voice comparison a practical everyday reality in Australia A4 Summary of Proposal (750 characters

More information

Automated Assessment of Diabetic Retinal Image Quality Based on Blood Vessel Detection

Automated Assessment of Diabetic Retinal Image Quality Based on Blood Vessel Detection Y.-H. Wen, A. Bainbridge-Smith, A. B. Morris, Automated Assessment of Diabetic Retinal Image Quality Based on Blood Vessel Detection, Proceedings of Image and Vision Computing New Zealand 2007, pp. 132

More information

How clear is transparent? Reporting expert reasoning in legal cases

How clear is transparent? Reporting expert reasoning in legal cases Law, Probability and Risk (2012) 11, 317 329 Advance Access publication on August 20, 2012 doi:10.1093/lpr/mgs017 How clear is transparent? Reporting expert reasoning in legal cases MARJAN J. SJERPS Netherlands

More information

Learning from data when all models are wrong

Learning from data when all models are wrong Learning from data when all models are wrong Peter Grünwald CWI / Leiden Menu Two Pictures 1. Introduction 2. Learning when Models are Seriously Wrong Joint work with John Langford, Tim van Erven, Steven

More information

THE VALUE OF SCIENTIFIC EVIDENCE FOR FORENSIC MULTIVARIATE DATA

THE VALUE OF SCIENTIFIC EVIDENCE FOR FORENSIC MULTIVARIATE DATA Statistica Applicata - Italian Journal of Applied Statistics Vol. 27 (2) 187 THE VALUE OF SCIENTIFIC EVIDENCE FOR FORENSIC MULTIVARIATE DATA Silvia Bozza 1 Department of Economics, Ca Foscari University

More information

The Best Bits in the Iris Code

The Best Bits in the Iris Code The Best Bits in the Iris Code Karen Hollingsworth Dept. of Computer Science and Engineering University of Notre Dame Where do the bits in the iris code come from? 2 Steps in Iris Biometrics Acquire Image

More information

January 2, Overview

January 2, Overview American Statistical Association Position on Statistical Statements for Forensic Evidence Presented under the guidance of the ASA Forensic Science Advisory Committee * January 2, 2019 Overview The American

More information

Natural Scene Statistics and Perception. W.S. Geisler

Natural Scene Statistics and Perception. W.S. Geisler Natural Scene Statistics and Perception W.S. Geisler Some Important Visual Tasks Identification of objects and materials Navigation through the environment Estimation of motion trajectories and speeds

More information

Gray level cooccurrence histograms via learning vector quantization

Gray level cooccurrence histograms via learning vector quantization Gray level cooccurrence histograms via learning vector quantization Timo Ojala, Matti Pietikäinen and Juha Kyllönen Machine Vision and Media Processing Group, Infotech Oulu and Department of Electrical

More information

AN EXPERIMENTAL STUDY OF A GESTALT BASED DATABASE FOR MUG SHOTS

AN EXPERIMENTAL STUDY OF A GESTALT BASED DATABASE FOR MUG SHOTS 1 AN EXPERIMENTAL STUDY OF A GESTALT BASED DATABASE FOR MUG SHOTS Unni Astad*, Frank Safayeni **, and Darrell Raymond *** * Norwegian Computing Center P.O. Box 114 Blindern, N-0314 Oslo, Norway. ** Department

More information

Preprocessing, Segmentation and Matching of Dental Radiographs used in Dental Biometrics

Preprocessing, Segmentation and Matching of Dental Radiographs used in Dental Biometrics ISSN No. 2278-3083 Volume 1, No.2, May June 2012 International Journal of Science and Applied Information Technology Available Online at www.warse.org/ijsait/info.html Shubhangi C. Dighe et al., International

More information

Facial Expression Biometrics Using Tracker Displacement Features

Facial Expression Biometrics Using Tracker Displacement Features Facial Expression Biometrics Using Tracker Displacement Features Sergey Tulyakov 1, Thomas Slowe 2,ZhiZhang 1, and Venu Govindaraju 1 1 Center for Unified Biometrics and Sensors University at Buffalo,

More information

EECS 433 Statistical Pattern Recognition

EECS 433 Statistical Pattern Recognition EECS 433 Statistical Pattern Recognition Ying Wu Electrical Engineering and Computer Science Northwestern University Evanston, IL 60208 http://www.eecs.northwestern.edu/~yingwu 1 / 19 Outline What is Pattern

More information

The Role of Face Parts in Gender Recognition

The Role of Face Parts in Gender Recognition The Role of Face Parts in Gender Recognition Yasmina Andreu Ramón A. Mollineda Pattern Analysis and Learning Section Computer Vision Group University Jaume I of Castellón (Spain) Y. Andreu, R.A. Mollineda

More information

Overview Detection epileptic seizures

Overview Detection epileptic seizures Overview Detection epileptic seizures Overview Problem Goal Method Detection with accelerometers Detection with video data Result Problem Detection of epileptic seizures with EEG (Golden Standard) Not

More information

Heart Abnormality Detection Technique using PPG Signal

Heart Abnormality Detection Technique using PPG Signal Heart Abnormality Detection Technique using PPG Signal L.F. Umadi, S.N.A.M. Azam and K.A. Sidek Department of Electrical and Computer Engineering, Faculty of Engineering, International Islamic University

More information

Admissibility of Forensic Voice Comparison Testimony in England and Wales

Admissibility of Forensic Voice Comparison Testimony in England and Wales Morrison G.S. (2018). Admissibility of forensic voice comparison testimony in England and Wales. Criminal Law Review, (1), 20 33. Reproduced on the author s website http://geoff-morrison.net/#admissibility_ew_2018

More information

Face Recognition Performance Under Aging

Face Recognition Performance Under Aging To appear in CVPR Workshop on Biometrics, 17 Face Recognition Performance Under Aging Debayan Deb Michigan State University East Lansing, MI, USA debdebay@msu.edu Lacey Best-Rowden Michigan State University

More information

Analysis of Emotion Recognition using Facial Expressions, Speech and Multimodal Information

Analysis of Emotion Recognition using Facial Expressions, Speech and Multimodal Information Analysis of Emotion Recognition using Facial Expressions, Speech and Multimodal Information C. Busso, Z. Deng, S. Yildirim, M. Bulut, C. M. Lee, A. Kazemzadeh, S. Lee, U. Neumann, S. Narayanan Emotion

More information

Measuring cell density in prostate cancer imaging as an input for radiotherapy treatment planning

Measuring cell density in prostate cancer imaging as an input for radiotherapy treatment planning Measuring cell density in prostate cancer imaging as an input for radiotherapy treatment planning Poster No.: R-0262 Congress: 2014 CSM Type: Scientific Exhibit Authors: H. Reynolds, S. Williams, A. Zhang,

More information

Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation

Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation U. Baid 1, S. Talbar 2 and S. Talbar 1 1 Department of E&TC Engineering, Shri Guru Gobind Singhji

More information

Evaluating DNA Profile Evidence When the Suspect Is Identified Through a Database Search

Evaluating DNA Profile Evidence When the Suspect Is Identified Through a Database Search David J. Balding, t Ph.D. and Peter Donnelly, 2 Ph.D. Evaluating DNA Profile Evidence When the Suspect Is Identified Through a Database Search REFERENCE: Balding, D. J. and Donnelly, E, "Evaluating DNA

More information

Subjective randomness and natural scene statistics

Subjective randomness and natural scene statistics Psychonomic Bulletin & Review 2010, 17 (5), 624-629 doi:10.3758/pbr.17.5.624 Brief Reports Subjective randomness and natural scene statistics Anne S. Hsu University College London, London, England Thomas

More information

Evaluative Reporting

Evaluative Reporting An introductory guide to Evaluative Reporting National Institute of Forensic Science Australia New Zealand About NIFS The National Institute of Forensic Science (NIFS) is a directorate within the Australia

More information

Image Processing of Eye for Iris Using. Canny Edge Detection Technique

Image Processing of Eye for Iris Using. Canny Edge Detection Technique Image Processing of Eye for Iris Using Canny Edge Detection Technique D. Anitha 1, M. Suganthi 2 & P. Suresh 3 1 Department of IT, Muthayammal Engineering College, Rasipuram, Tamilnadu. 2 Department of

More information

Implicit Information in Directionality of Verbal Probability Expressions

Implicit Information in Directionality of Verbal Probability Expressions Implicit Information in Directionality of Verbal Probability Expressions Hidehito Honda (hito@ky.hum.titech.ac.jp) Kimihiko Yamagishi (kimihiko@ky.hum.titech.ac.jp) Graduate School of Decision Science

More information

A Vision-based Affective Computing System. Jieyu Zhao Ningbo University, China

A Vision-based Affective Computing System. Jieyu Zhao Ningbo University, China A Vision-based Affective Computing System Jieyu Zhao Ningbo University, China Outline Affective Computing A Dynamic 3D Morphable Model Facial Expression Recognition Probabilistic Graphical Models Some

More information

Validating the Visual Saliency Model

Validating the Visual Saliency Model Validating the Visual Saliency Model Ali Alsam and Puneet Sharma Department of Informatics & e-learning (AITeL), Sør-Trøndelag University College (HiST), Trondheim, Norway er.puneetsharma@gmail.com Abstract.

More information

Modelling crime linkage with Bayesian Networks

Modelling crime linkage with Bayesian Networks Modelling crime linkage with Bayesian Networks, Marjan Sjerps, David Lagnado, Norman Fenton, Koen Vriend, Menno Dolman, Ronald Meester University of Amsterdam August 20, 2014 Problem Outline Hypotheses

More information

Automatic cardiac contour propagation in short axis cardiac MR images

Automatic cardiac contour propagation in short axis cardiac MR images International Congress Series 1281 (2005) 351 356 www.ics-elsevier.com Automatic cardiac contour propagation in short axis cardiac MR images G.L.T.F. Hautvast a,b, T, M. Breeuwer a, S. Lobregt a, A. Vilanova

More information

AN ALGORITHM FOR EARLY BREAST CANCER DETECTION IN MAMMOGRAMS

AN ALGORITHM FOR EARLY BREAST CANCER DETECTION IN MAMMOGRAMS AN ALGORITHM FOR EARLY BREAST CANCER DETECTION IN MAMMOGRAMS Isaac N. Bankman', William A. Christens-Barryl, Irving N. Weinberg2, Dong W. Kim3, Ralph D. Semmell, and William R. Brody2 The Johns Hopkins

More information

Introduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018

Introduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018 Introduction to Machine Learning Katherine Heller Deep Learning Summer School 2018 Outline Kinds of machine learning Linear regression Regularization Bayesian methods Logistic Regression Why we do this

More information

Emotion Recognition using a Cauchy Naive Bayes Classifier

Emotion Recognition using a Cauchy Naive Bayes Classifier Emotion Recognition using a Cauchy Naive Bayes Classifier Abstract Recognizing human facial expression and emotion by computer is an interesting and challenging problem. In this paper we propose a method

More information

On the feasibility of speckle reduction in echocardiography using strain compounding

On the feasibility of speckle reduction in echocardiography using strain compounding Title On the feasibility of speckle reduction in echocardiography using strain compounding Author(s) Guo, Y; Lee, W Citation The 2014 IEEE International Ultrasonics Symposium (IUS 2014), Chicago, IL.,

More information

MULTIPLE LINEAR REGRESSION 24.1 INTRODUCTION AND OBJECTIVES OBJECTIVES

MULTIPLE LINEAR REGRESSION 24.1 INTRODUCTION AND OBJECTIVES OBJECTIVES 24 MULTIPLE LINEAR REGRESSION 24.1 INTRODUCTION AND OBJECTIVES In the previous chapter, simple linear regression was used when you have one independent variable and one dependent variable. This chapter

More information

Type II Fuzzy Possibilistic C-Mean Clustering

Type II Fuzzy Possibilistic C-Mean Clustering IFSA-EUSFLAT Type II Fuzzy Possibilistic C-Mean Clustering M.H. Fazel Zarandi, M. Zarinbal, I.B. Turksen, Department of Industrial Engineering, Amirkabir University of Technology, P.O. Box -, Tehran, Iran

More information

1 Introduction. st0020. The Stata Journal (2002) 2, Number 3, pp

1 Introduction. st0020. The Stata Journal (2002) 2, Number 3, pp The Stata Journal (22) 2, Number 3, pp. 28 289 Comparative assessment of three common algorithms for estimating the variance of the area under the nonparametric receiver operating characteristic curve

More information

Impact of Image Quality on Performance: Comparison of Young and Elderly Fingerprints

Impact of Image Quality on Performance: Comparison of Young and Elderly Fingerprints Impact of Image Quality on Performance: Comparison of Young and Elderly Fingerprints Shimon K. Modi and Dr. Stephen J. Elliott Department of Industrial Technology Purdue University West Lafayette, Indiana-

More information

Gene expression analysis. Roadmap. Microarray technology: how it work Applications: what can we do with it Preprocessing: Classification Clustering

Gene expression analysis. Roadmap. Microarray technology: how it work Applications: what can we do with it Preprocessing: Classification Clustering Gene expression analysis Roadmap Microarray technology: how it work Applications: what can we do with it Preprocessing: Image processing Data normalization Classification Clustering Biclustering 1 Gene

More information

Research Article Automatic Speaker Recognition for Mobile Forensic Applications

Research Article Automatic Speaker Recognition for Mobile Forensic Applications Hindawi Mobile Information Systems Volume 07, Article ID 698639, 6 pages https://doi.org//07/698639 Research Article Automatic Speaker Recognition for Mobile Forensic Applications Mohammed Algabri, Hassan

More information

Israel Police, Division of Identification and Forensic Science.

Israel Police, Division of Identification and Forensic Science. Israel Police, Division of Identification and Forensic Science. Toolmarks and Materials Lab. Hadassah Academic College, Dept. of Computer Science Hebrew University, Dept. of Statistics. The Israeli research

More information

Digital evidence, absence of data and ambiguous patterns of reasoning

Digital evidence, absence of data and ambiguous patterns of reasoning Digital evidence, absence of data and ambiguous patterns of reasoning 3rd Annual Digital Forensic Research Conference (DFRWS 2016 Europe), 29 March 1 April 2016 University of Lausanne by Alex Biedermann,

More information

Scale of conclusions for the value of evidence

Scale of conclusions for the value of evidence Law, Probability and Risk (2012) 11, 1 24 Advance Access publication on October 24, 2011 doi:10.1093/lpr/mgr020 Scale of conclusions for the value of evidence ANDERS NORDGAARD The Swedish National Laboratory

More information

ADAPTING COPYCAT TO CONTEXT-DEPENDENT VISUAL OBJECT RECOGNITION

ADAPTING COPYCAT TO CONTEXT-DEPENDENT VISUAL OBJECT RECOGNITION ADAPTING COPYCAT TO CONTEXT-DEPENDENT VISUAL OBJECT RECOGNITION SCOTT BOLLAND Department of Computer Science and Electrical Engineering The University of Queensland Brisbane, Queensland 4072 Australia

More information

SLAUGHTER PIG MARKETING MANAGEMENT: UTILIZATION OF HIGHLY BIASED HERD SPECIFIC DATA. Henrik Kure

SLAUGHTER PIG MARKETING MANAGEMENT: UTILIZATION OF HIGHLY BIASED HERD SPECIFIC DATA. Henrik Kure SLAUGHTER PIG MARKETING MANAGEMENT: UTILIZATION OF HIGHLY BIASED HERD SPECIFIC DATA Henrik Kure Dina, The Royal Veterinary and Agricuural University Bülowsvej 48 DK 1870 Frederiksberg C. kure@dina.kvl.dk

More information

Development of an Electronic Glove with Voice Output for Finger Posture Recognition

Development of an Electronic Glove with Voice Output for Finger Posture Recognition Development of an Electronic Glove with Voice Output for Finger Posture Recognition F. Wong*, E. H. Loh, P. Y. Lim, R. R. Porle, R. Chin, K. Teo and K. A. Mohamad Faculty of Engineering, Universiti Malaysia

More information

Programme Specification

Programme Specification Programme Specification Title: Forensic Science Final Award: Master of Science (MSc) With Exit Awards at: Master of Science (MSc) Postgraduate Certificate (PG Cert) Postgraduate Diploma (PG Dip) To be

More information

Method Comparison for Interrater Reliability of an Image Processing Technique in Epilepsy Subjects

Method Comparison for Interrater Reliability of an Image Processing Technique in Epilepsy Subjects 22nd International Congress on Modelling and Simulation, Hobart, Tasmania, Australia, 3 to 8 December 2017 mssanz.org.au/modsim2017 Method Comparison for Interrater Reliability of an Image Processing Technique

More information

A likelihood ratio-based forensic text comparison in predatory chatlog messages

A likelihood ratio-based forensic text comparison in predatory chatlog messages A likelihood ratio-based forensic text comparison in predatory chatlog messages Shunichi&Ishihara& Australian&National&University& shunichi.ishihara@anu.edu.au& An experiment in Forensic Text Comparison

More information

Analysis of Environmental Data Conceptual Foundations: En viro n m e n tal Data

Analysis of Environmental Data Conceptual Foundations: En viro n m e n tal Data Analysis of Environmental Data Conceptual Foundations: En viro n m e n tal Data 1. Purpose of data collection...................................................... 2 2. Samples and populations.......................................................

More information

Correlating Trust with Signal Detection Theory Measures in a Hybrid Inspection System

Correlating Trust with Signal Detection Theory Measures in a Hybrid Inspection System Correlating Trust with Signal Detection Theory Measures in a Hybrid Inspection System Xiaochun Jiang Department of Industrial and Systems Engineering North Carolina A&T State University 1601 E Market St

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1 Motivation and Goals The increasing availability and decreasing cost of high-throughput (HT) technologies coupled with the availability of computational tools and data form a

More information

FEATURE EXTRACTION USING GAZE OF PARTICIPANTS FOR CLASSIFYING GENDER OF PEDESTRIANS IN IMAGES

FEATURE EXTRACTION USING GAZE OF PARTICIPANTS FOR CLASSIFYING GENDER OF PEDESTRIANS IN IMAGES FEATURE EXTRACTION USING GAZE OF PARTICIPANTS FOR CLASSIFYING GENDER OF PEDESTRIANS IN IMAGES Riku Matsumoto, Hiroki Yoshimura, Masashi Nishiyama, and Yoshio Iwai Department of Information and Electronics,

More information

Issues of Bias and Statistics. Glenn Langenburg

Issues of Bias and Statistics. Glenn Langenburg Issues of Bias and Statistics Glenn Langenburg General Outline 1. Bias exists 2. So what? 3. Risk of error from bias v. risk of lack of information Existence of Bias in Forensic Science Bitemarks Trace,

More information

Numerical Integration of Bivariate Gaussian Distribution

Numerical Integration of Bivariate Gaussian Distribution Numerical Integration of Bivariate Gaussian Distribution S. H. Derakhshan and C. V. Deutsch The bivariate normal distribution arises in many geostatistical applications as most geostatistical techniques

More information

Introduction to diagnostic accuracy meta-analysis. Yemisi Takwoingi October 2015

Introduction to diagnostic accuracy meta-analysis. Yemisi Takwoingi October 2015 Introduction to diagnostic accuracy meta-analysis Yemisi Takwoingi October 2015 Learning objectives To appreciate the concept underlying DTA meta-analytic approaches To know the Moses-Littenberg SROC method

More information

A framework for the Recognition of Human Emotion using Soft Computing models

A framework for the Recognition of Human Emotion using Soft Computing models A framework for the Recognition of Human Emotion using Soft Computing models Md. Iqbal Quraishi Dept. of Information Technology Kalyani Govt Engg. College J Pal Choudhury Dept. of Information Technology

More information

A Meta-Analysis of Face Recognition Covariates

A Meta-Analysis of Face Recognition Covariates A Meta-Analysis of Face Recognition Covariates Yui Man Lui, David Bolme, Bruce A. Draper, J. Ross Beveridge, Geoff Givens, P. Jonathon Phillips Abstract This paper presents a meta-analysis for covariates

More information

Unit of Forensic Anthropology. Gait as evidence. Niels Lynnerup

Unit of Forensic Anthropology. Gait as evidence. Niels Lynnerup Unit of Forensic Anthropology Gait as evidence Niels Lynnerup nly@sund.ku.dk Unit of Forensic Anthropology Subject of study: The entire human body Specific features Static In motion Evidence based Judicial

More information

An Efficient Hybrid Rule Based Inference Engine with Explanation Capability

An Efficient Hybrid Rule Based Inference Engine with Explanation Capability To be published in the Proceedings of the 14th International FLAIRS Conference, Key West, Florida, May 2001. An Efficient Hybrid Rule Based Inference Engine with Explanation Capability Ioannis Hatzilygeroudis,

More information